SlideShare una empresa de Scribd logo
1 de 19
PRESENTACIÓN DE LA COMPAÑÍA
UNISYS
UNISYS CORPORATION
r
En más de 120 países
Más de 23,000 empleados
Casa matriz: Blue Bell, PA (U.S.A.)
Datos de la Capacidad de Trabajo
• Mas de 30 años de experiencia en el desarrollo
de soluciones.
• Mas de 1400, aplicaciones pre-construidas y
modelos de procesos.
• 200 millones de correos de voz alrededor del
mundo.
• 600 aeropuertos
• 22 de los 25 bancos más grandes
• 1.500 agencias de gobiernos
Datos de la Capacidad de Trabajo
• Mas de 30 años de experiencia en el desarrollo
de soluciones.
• Mas de 1400, aplicaciones pre-construidas y
modelos de procesos.
• 200 millones de correos de voz alrededor del
mundo.
• 600 aeropuertos
• 22 de los 25 bancos más grandes
• 1.500 agencias de gobiernos
Page 3
Remington e Hijos inctroduce la
primera maquina de escribir al
mercado
Unisys Corporation
…Más de un siglo de historia
1873
Se funda la American Arithmometer Co. para
producir y vender la primera sumadora comercial
inventada por William Burroughs
1886
La American Arithmometer cambia
su nombre a Burroughs Adding
Machine Co.
1905
Se funda la Sperry Gyroscope
Company para producir y vender
equipo de navegación
1910
ENIAC, el primer computador a gran escala
fue desarrollado en la Universidad de
Pennsylvania por los científicos J. Presper
Eckert and John Mauchly
1946
Remington Rand produce el
primer computador orientado a
negocios, llamado UNIVAC, fue el primer
computador usado por la Of. de Impuestos de EEUU
y el primer computador instalado en Japón
1949
Remington Rand adquiere la
Eckert-Mauchly Computer Corp.
1950
Sperry y Remington Rand se fucionan y se
convierten en Sperry Rand
1955
Sperry y Burroughs se fucionan para formar
Unisys Corporation. La fución más grande de la
industria de la tecnología hasta ese momento. El
nombre Unisys fue elegido entre 31,000
propuestas de un concurso promovido entre los
empleados de ambas compañías
1986
Unisys en Colombia
En 1952… En Julio de 1952 llegan los directivos de
Burroughs para comenzar a trabajar en el país
con su propia marca.
La firma que representaba a Burroughs en
el país en 1948 era J. Glottman.
La firma cambia su nombre adecuándose a la
fusión que acaba de ocurrir en EEUU, pasando a
llamarse UNISYS.
Desde 1948…
En 1986…
Unisys Corporation toma la desición de fundar
una segunda compañía en Colombia
especializada en servicios de Help Desk y
Soporte en Sitio.
En 2009…
Unisys en la Región LACSA.
• Conformada por Colombia, Perú,
Venezuela, Argentina, Chile, Uruguay,
Costa Rica y Puerto Rico.
• + 800 empleados directos.
• + 1700 contratistas.
• Carlos Ferrer – Presidente.
Visión de UNISYS.
Portafolio Productos y
Soluciones Unisys
Page 8© 2009 Unisys Corporation. All rights reserved.
Cuatro Fortaleza y Foco
Modernización de
Aplicaciones y
Outsourcing
Transformación de
Data Center y
Outsourcing
Soporte a Usuario
Final y Outsourcing
Seguridad
Page 9© 2009 Unisys Corporation. All rights reserved.
Portafolio de Seguridad
Evaluamos, diseñamos, integramos y gestionamos soluciones de misión critica que aseguran personas, activos,
lugares, sistemas y datos para gobiernos o negocios que no pueden permitirse errores.
Security Advisory Services
• Risk Advisory Services
• Governance & Risk Program Management
• Business Continuity/Disaster Recovery
Planning
• Application Security Assessment
IT Security Design and
Implementation
• Infrastructure Architecture & Engineering
• Unisys Enterprise Virtualization
• Secure Cloud
• Disaster Recovery Architecture Service
• Managed Messaging and Collaboration
(ERM)
• Fraud and Anti-Money Laundering
• Secure Document Delivery
• Secure Information Sharing (Stealth)
• Application Security Integration
Identity Solutions
• Identity Management
• Access Management
• Identification & Credentialing
Secure Commerce and
In-Transit VisibilityAI
I n-Transit Visibility / Total Asset Visibility /
RFID
• Port Security Roadmaps
Managed Security Services
• Remote Managed Security
• Converged Remote Infrastructure
Management Suite
• Endpoint Security
• Vulnerability and Risk Management
• Orchestrated Disaster Recovery and
Business Continuance
Location, Perimeter and
Surveillance Security
• Intelligent Video Surveillance
• Facility Management and Access Control
• Command and Perimeter Security Systems
• Border Security SystemsLaw Enforcement and Public
Safety
• Integrated Justice & Interoperability
• Intelligent Video Surveillance
• Inmate Telephony System
Page 10
Vision de UNISYS en Transformacion de Data
Centers: Un viaje a un servicio de TI eficiente y
majeado por el negocio.
Reduced cost
Faster speed
to market
Optimized
operations
Improved service
levels
Business drivers
Current state
Decentralized
Complex
Resource-intensive
Costly
Transformed state
Consolidated
Automated
Efficient
Cost-effective
Data Center Transformation
Data center
planning &
management
Virtualization &
consolidation
Service
management
& operations
Data
management
& storage
Secure cloud & IT outsourcing
Advisory services
IT initiatives
Infrastructure
applications
Page 11© 2009 Unisys Corporation. All rights reserved.
Portafolio de Transformación de Data
Center y Outsourcing
Ayudamos a nuestros clientes a potenciar sus negocios apalancando nuestros servicios de transformacionales
y nuestras capacidades de outsourcing en sus data centers.
Cloud and IT Automation Solutions
• Unisys Secure Cloud Solution
• Cloud Transformation Services
• IT Service Management Consulting Services
• Unisys Infrastructure Management Suite
Software and Solutions
• Unisys Stealth Solution for Network
• SafeGuard
• Storage Virtualization Products
Enterprise Computing
Solutions
• Server Management
• Storage Management
• Application Hosting Services
• Converged Remote Infrastructure
Management Suite
• Network Infrastructure Management
• Remote Managed Security
• Email Management
• Smart On-Site Services
• Enterprise Multi-vendor Support
• Private Label Services
• Unisys Product Support
Advisory and Planning
Services
• DCT Advisory Services
• DCT Planning and Management
Services
Virtualization and Consolidation
• Virtualization & Consolidation Services
• Unisys Consolidated Desktop Solution
• Unisys Consolidated Solution for Microsoft
Exchange Server
• Unisys SQL Server Database
Consolidation Solution
• Self-funding Server Virtualization
• Storage Virtualization Solutions
• Enterprise Virtualization Suite
• Unisys Infrastructure Management Suite
Solutions
• Storage Virtualization Products
Data Management and Storage
• Data Management and Storage Services
• Storage Virtualization Solution
• SafeGuard Solutions
• Disk & Tape Storage
• Storage Networking
ClearPath and Enterprise
Servers
• ClearPath Mainframe Servers
• ClearPath Professional Services
• SOA for ClearPath
• Enterprise Servers
Desktop Services Convecionales:
Core Framework Managed End-User Experience
© 2009
Unisy
Services Benefits
Service Desk
• Self-service portal
• Service Request Catalog
• Optimized Resolution Model
• Remote diagnostics and assistance
• Single point of contact via multiple
communication channels
• Consistent, seamless delivery worldwide 24x7
• Timely and successful resolution via integrated
support levels
Desk-side Support
• IMACDs
• Hardware Asset Tracking
• On-Site Support
• Asset life-cycle visibility and management
• Hardware maintenance across multi vendor
platforms
• Last mile support when all else fails to resolve
Desktop Management Services
• Image Management
• Patch Management
• Asset Configuration Tracking
• Electronic Software Distribution
• Cost containment
• Increased end user productivity
• Higher IT Efficiency / performance
• Liberated resources from low-value
administrative tasks
Desktop Application Services
• Application Packaging
• Application Catalog and License Tracking
• Virtual Application Preparation
• Application Experience Monitoring
• Robust service levels
• Better license tracking for cost containment
• Increased end user productivity
• Proactive and preventative
Modelos de Entrega y Servicios
Innovadores
Services Benefits
VOaaS (Virtual Office as a Service)
• Cloud-delivered desktops via subscription
• More secure, reduced risk, continuity
• Disaster recovery option for desktops
• Capital avoidance
• Greater accessibility
UCaaS (Unified Communications as a Service)
• Cloud delivery of multi-tenant collaboration, e-
mail and communication applications via
subscription
• Simplified delivery
• Cost effective
• Scalability
• Reduced operational burden
Application Virtualization Services
• Preparation, sequencing and deployment of
desktop applications for use in a virtual
environment
• Improved application management
• Avoid in-house support
• Simplifies application deployment and
maintenance
Virtual Desktop Services
• Monitoring and management of virtual desktops
including virtual machine preparation, install,
change and update including the creation and
support of pools of virtual desktops and the
association of groups of users
• Avoid in-house support
• Simple extension of conventional services to
virtual deploy
• Simplified management
• Reduced cost
Gestion de Digital Allowance:
Flexibilidad y Escogencia del Usuario
Page 14
Services Benefits
Remediation Service
• Enhanced remote personal computer monitoring
and repair tools
• Online and Remote Device Support
• Enhanced user and self support options
• Better end user experience
Managed Digital Allowance
• Online portal with tools for end-user selection
and support of devices for use in the workplace
• Portal with Bookstore
• Flexibility and choice
• Greater user satisfaction
• Improved user productivity
Client-side Virtualization Services
• Monitoring and management of end-user device-
resident virtual desktops
• Portable Virtual Client Service
• Greater device flexibility
• Better end user experience
• Secure deployment
Page 15© 2009 Unisys Corporation. All rights reserved.
Portafolio de Soporte a Usuarios
Finales y Outsourcing
Unisys End User Services provee en cualquier lugar y a cualquier hora soporte a los usuarios finales de nuestros
clientes con un modelo global de una-llamada que incrementa la satisfacción del usuario mientras bajan los
costos.
Business Service Management
• Converged Remote Infrastructure
Management
• Service Desk
Platform as a Service
• Email Management
• Managed Messaging and Collaboration
• Communications and Collaboration
• Consolidated Solutions for MS Exchange
Managed Security Services
• Endpoint Security
• Vulnerability and Risk Management
• Identity and Access Management
• Remote Managed Security
End User Support Solutions
• End User Productivity Services
• Self-Service Portal Solutions
• Desktop Lifecycle Management
• Desktop Deployment and Image
Management
• Consolidated Desktop Solutions
Infrastructure Support Solutions
• Smart-On-Site Services
• Multi-Vendor Support
• Enterprise Multi-Vendor Support
• Private Label Services
• Hardware and Software Asset
Management
16
Proveemos servicios para el ciclo de
vida de las aplicaciones
Planning
Architecture
Application
Infrastructure
Resources
Secure Business Operations
Application Portfolio
Assessment
Governance Security Assessment
Enterprise Architecture
Application Modernization
TestingApp Development & Systems Integration
Application Management
Application Hosting
Global Solution Centers
Application Management Centers
Low-Cost Labors Coordination
These capabilities will be specialized to support specific Industry Solutions
SOA Enablement
Page 17© 2009 Unisys Corporation. All rights reserved.
Portafolio de Modernización de
Aplicaciones y Outsourcing
Mejoramos la productividad de nuestros clientes y su posición competitiva modernizando y tercerizando las
aplicaciones de misión critica. Nuestra capacidades extiende la vida de los activos actuales de nuestros
clientes.
Application Advisory
• IT Strategy and Transformation
• Enterprise Architecture & Technology
• Application Modernization Advisory
• Application Outsourcing Advisory
• Application Security Assessments
Application Security
• Security Assessments
• Security Integration
Application Modernization
• Discovery and Planning
• Transformation Services
• Customer Programs Management
Application Outsourcing
• Development
• Operations
• Customer Program Management
• Hosting
• Support and Maintenance
Industry Applications
• Financial
• Government
• Communications
• Transportation
Page 18© 2009 Unisys Corporation. All rights reserved.
Alianzas Estratégicas de UNISYS
Alianzas fuertes con otras organizaciones lideres de industria no
permiten movernos rápida y confiadamente a través de un amplio
rango de tecnologías y servicios que nos ayudan a entregar lo la
mejor solución a los retos de negocio críticos de nuestros clientes.
Page 19
Servicios
Financieros
Sector
Público
Telecomunicaciones
Transporte
Comercial
Medios
Industrias en el mundo

Más contenido relacionado

Similar a Unisys presentacion compania

Presentación Corporativa Saytel
Presentación Corporativa Saytel Presentación Corporativa Saytel
Presentación Corporativa Saytel Saytel
 
Presentación Corporativa Comunicación Alterna
Presentación Corporativa Comunicación Alterna Presentación Corporativa Comunicación Alterna
Presentación Corporativa Comunicación Alterna Capacitación emogénica
 
Brochure Guía TIC 2017
Brochure Guía TIC 2017Brochure Guía TIC 2017
Brochure Guía TIC 2017MD Group
 
Presentacion creativ IT productos Ayuntamientos
Presentacion creativ IT productos AyuntamientosPresentacion creativ IT productos Ayuntamientos
Presentacion creativ IT productos AyuntamientosCarlos Prades
 
Grupo redex perfil empresarial clientes 2013 sp
Grupo redex   perfil empresarial clientes 2013 spGrupo redex   perfil empresarial clientes 2013 sp
Grupo redex perfil empresarial clientes 2013 spGrupo Redex
 
Presentacion catálogo de servicios 2012
Presentacion catálogo de servicios 2012Presentacion catálogo de servicios 2012
Presentacion catálogo de servicios 2012LD I ASSOCIATS
 
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...Cluster Construction Eraikune
 
Computación en la nube
Computación en la nubeComputación en la nube
Computación en la nubedavidrami78
 
Soitsa Presentación 2013
Soitsa Presentación 2013Soitsa Presentación 2013
Soitsa Presentación 2013SOITSA
 
Entornos de negocios en internet
Entornos de negocios en internetEntornos de negocios en internet
Entornos de negocios en internetLima Innova
 
2013 Nueva presentación corporativa + infraestructura (esp)
2013 Nueva presentación corporativa + infraestructura (esp)2013 Nueva presentación corporativa + infraestructura (esp)
2013 Nueva presentación corporativa + infraestructura (esp)AnyHelp International
 
Intelligy productos y servicios
Intelligy productos y serviciosIntelligy productos y servicios
Intelligy productos y serviciosIntelligy
 
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras Viewnext
 
Gigas presentación corporativa febrero 2013
Gigas   presentación corporativa febrero 2013Gigas   presentación corporativa febrero 2013
Gigas presentación corporativa febrero 2013Gerard Prats
 
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria Ingeligene
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria IngeligeneTaller TUI Chile 2014 - Tendencias Tarjeta Universitaria Ingeligene
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria IngeligeneJavier De Andrés Rivero
 
Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Alejandro Murcia
 
Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Alejandro Murcia
 
Comunicaciones, buscando productividad y colaboración
Comunicaciones, buscando productividad y colaboraciónComunicaciones, buscando productividad y colaboración
Comunicaciones, buscando productividad y colaboraciónPaloSanto Solutions
 

Similar a Unisys presentacion compania (20)

Presentación Corporativa Saytel
Presentación Corporativa Saytel Presentación Corporativa Saytel
Presentación Corporativa Saytel
 
Presentación Corporativa Comunicación Alterna
Presentación Corporativa Comunicación Alterna Presentación Corporativa Comunicación Alterna
Presentación Corporativa Comunicación Alterna
 
Isoc ig & cons [autosaved]
Isoc ig & cons [autosaved]Isoc ig & cons [autosaved]
Isoc ig & cons [autosaved]
 
Brochure Guía TIC 2017
Brochure Guía TIC 2017Brochure Guía TIC 2017
Brochure Guía TIC 2017
 
Presentacion creativ IT productos Ayuntamientos
Presentacion creativ IT productos AyuntamientosPresentacion creativ IT productos Ayuntamientos
Presentacion creativ IT productos Ayuntamientos
 
Grupo redex perfil empresarial clientes 2013 sp
Grupo redex   perfil empresarial clientes 2013 spGrupo redex   perfil empresarial clientes 2013 sp
Grupo redex perfil empresarial clientes 2013 sp
 
Presentacion catálogo de servicios 2012
Presentacion catálogo de servicios 2012Presentacion catálogo de servicios 2012
Presentacion catálogo de servicios 2012
 
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...
3 Casos Prácticos de Uso de la Tecnología para mejorar la rentabilidad de las...
 
Computación en la nube
Computación en la nubeComputación en la nube
Computación en la nube
 
Soitsa Presentación 2013
Soitsa Presentación 2013Soitsa Presentación 2013
Soitsa Presentación 2013
 
Entornos de negocios en internet
Entornos de negocios en internetEntornos de negocios en internet
Entornos de negocios en internet
 
2013 Nueva presentación corporativa + infraestructura (esp)
2013 Nueva presentación corporativa + infraestructura (esp)2013 Nueva presentación corporativa + infraestructura (esp)
2013 Nueva presentación corporativa + infraestructura (esp)
 
Intelligy productos y servicios
Intelligy productos y serviciosIntelligy productos y servicios
Intelligy productos y servicios
 
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras
Modelo CENIT. Servicios de Gestión de Aplicaciones e infraestructuras
 
Strelia cloud 2010 ramon ares (ozona)
Strelia cloud 2010 ramon ares (ozona)Strelia cloud 2010 ramon ares (ozona)
Strelia cloud 2010 ramon ares (ozona)
 
Gigas presentación corporativa febrero 2013
Gigas   presentación corporativa febrero 2013Gigas   presentación corporativa febrero 2013
Gigas presentación corporativa febrero 2013
 
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria Ingeligene
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria IngeligeneTaller TUI Chile 2014 - Tendencias Tarjeta Universitaria Ingeligene
Taller TUI Chile 2014 - Tendencias Tarjeta Universitaria Ingeligene
 
Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Presentación corporativa 2016 v2
Presentación corporativa 2016 v2
 
Presentación corporativa 2016 v2
Presentación corporativa 2016 v2Presentación corporativa 2016 v2
Presentación corporativa 2016 v2
 
Comunicaciones, buscando productividad y colaboración
Comunicaciones, buscando productividad y colaboraciónComunicaciones, buscando productividad y colaboración
Comunicaciones, buscando productividad y colaboración
 

Último

ANÁLISIS CAME, DIAGNOSTICO PUERTO DEL CALLAO
ANÁLISIS CAME, DIAGNOSTICO  PUERTO DEL CALLAOANÁLISIS CAME, DIAGNOSTICO  PUERTO DEL CALLAO
ANÁLISIS CAME, DIAGNOSTICO PUERTO DEL CALLAOCarlosAlbertoVillafu3
 
informacion-finanTFHHETHAETHciera-2022.pdf
informacion-finanTFHHETHAETHciera-2022.pdfinformacion-finanTFHHETHAETHciera-2022.pdf
informacion-finanTFHHETHAETHciera-2022.pdfPriscilaBermello
 
fracturas de antebhbunununrazo [II].pptx
fracturas de antebhbunununrazo  [II].pptxfracturas de antebhbunununrazo  [II].pptx
fracturas de antebhbunununrazo [II].pptxkarlagonzalez159945
 
Trabajo de Sifilisn…………………………………………………..
Trabajo de Sifilisn…………………………………………………..Trabajo de Sifilisn…………………………………………………..
Trabajo de Sifilisn…………………………………………………..JoseRamirez247144
 
diseño de redes en la cadena de suministro.pptx
diseño de redes en la cadena de suministro.pptxdiseño de redes en la cadena de suministro.pptx
diseño de redes en la cadena de suministro.pptxjuanleivagdf
 
Continex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosContinex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosFundación YOD YOD
 
modelo de flujo maximo unidad 4 en modelos de optimización de recursos
modelo de flujo maximo unidad 4 en modelos de optimización de recursosmodelo de flujo maximo unidad 4 en modelos de optimización de recursos
modelo de flujo maximo unidad 4 en modelos de optimización de recursosk7v476sp7t
 
ISO 45001-2018.pdf norma internacional para la estandarización
ISO 45001-2018.pdf norma internacional para la estandarizaciónISO 45001-2018.pdf norma internacional para la estandarización
ISO 45001-2018.pdf norma internacional para la estandarizaciónjesuscub33
 
AUDITORIAS en enfermeria hospitalaria .pptx
AUDITORIAS en enfermeria hospitalaria .pptxAUDITORIAS en enfermeria hospitalaria .pptx
AUDITORIAS en enfermeria hospitalaria .pptxMatiasGodoy33
 
MARKETING SENSORIAL -GABRIELA ARDON .pptx
MARKETING SENSORIAL -GABRIELA ARDON .pptxMARKETING SENSORIAL -GABRIELA ARDON .pptx
MARKETING SENSORIAL -GABRIELA ARDON .pptxgabyardon485
 
Presentación de la empresa polar, estados financieros
Presentación de la empresa polar, estados financierosPresentación de la empresa polar, estados financieros
Presentación de la empresa polar, estados financierosmadaloga01
 
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESA
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESACOPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESA
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESADanielAndresBrand
 
clase de Mercados financieros - lectura importante
clase de Mercados financieros - lectura importanteclase de Mercados financieros - lectura importante
clase de Mercados financieros - lectura importanteJanettCervantes1
 
Régimen Depósito Aduanero_20200203 V1.pptx
Régimen Depósito Aduanero_20200203 V1.pptxRégimen Depósito Aduanero_20200203 V1.pptx
Régimen Depósito Aduanero_20200203 V1.pptxDavesGirao
 
Efectos del cambio climatico en huanuco.pptx
Efectos del cambio climatico en huanuco.pptxEfectos del cambio climatico en huanuco.pptx
Efectos del cambio climatico en huanuco.pptxCONSTRUCTORAEINVERSI3
 
Contabilidad universitaria Septima edición de MCGrawsHill
Contabilidad universitaria Septima edición de MCGrawsHillContabilidad universitaria Septima edición de MCGrawsHill
Contabilidad universitaria Septima edición de MCGrawsHilldanilojaviersantiago
 
IDENTIDAD Y MANUAL DE MARCA PARA BRANDING
IDENTIDAD Y MANUAL DE MARCA PARA BRANDINGIDENTIDAD Y MANUAL DE MARCA PARA BRANDING
IDENTIDAD Y MANUAL DE MARCA PARA BRANDINGAndresGEscobar
 
Plan General de Contabilidad Y PYMES pdf
Plan General de Contabilidad Y PYMES pdfPlan General de Contabilidad Y PYMES pdf
Plan General de Contabilidad Y PYMES pdfdanilojaviersantiago
 
instrumentos de mercados financieros para estudiantes
instrumentos de mercados financieros  para estudiantesinstrumentos de mercados financieros  para estudiantes
instrumentos de mercados financieros para estudiantessuperamigo2014
 
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docx
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docxPLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docx
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docxwilliamzaveltab
 

Último (20)

ANÁLISIS CAME, DIAGNOSTICO PUERTO DEL CALLAO
ANÁLISIS CAME, DIAGNOSTICO  PUERTO DEL CALLAOANÁLISIS CAME, DIAGNOSTICO  PUERTO DEL CALLAO
ANÁLISIS CAME, DIAGNOSTICO PUERTO DEL CALLAO
 
informacion-finanTFHHETHAETHciera-2022.pdf
informacion-finanTFHHETHAETHciera-2022.pdfinformacion-finanTFHHETHAETHciera-2022.pdf
informacion-finanTFHHETHAETHciera-2022.pdf
 
fracturas de antebhbunununrazo [II].pptx
fracturas de antebhbunununrazo  [II].pptxfracturas de antebhbunununrazo  [II].pptx
fracturas de antebhbunununrazo [II].pptx
 
Trabajo de Sifilisn…………………………………………………..
Trabajo de Sifilisn…………………………………………………..Trabajo de Sifilisn…………………………………………………..
Trabajo de Sifilisn…………………………………………………..
 
diseño de redes en la cadena de suministro.pptx
diseño de redes en la cadena de suministro.pptxdiseño de redes en la cadena de suministro.pptx
diseño de redes en la cadena de suministro.pptx
 
Continex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosContinex para educación, Portafolio de servicios
Continex para educación, Portafolio de servicios
 
modelo de flujo maximo unidad 4 en modelos de optimización de recursos
modelo de flujo maximo unidad 4 en modelos de optimización de recursosmodelo de flujo maximo unidad 4 en modelos de optimización de recursos
modelo de flujo maximo unidad 4 en modelos de optimización de recursos
 
ISO 45001-2018.pdf norma internacional para la estandarización
ISO 45001-2018.pdf norma internacional para la estandarizaciónISO 45001-2018.pdf norma internacional para la estandarización
ISO 45001-2018.pdf norma internacional para la estandarización
 
AUDITORIAS en enfermeria hospitalaria .pptx
AUDITORIAS en enfermeria hospitalaria .pptxAUDITORIAS en enfermeria hospitalaria .pptx
AUDITORIAS en enfermeria hospitalaria .pptx
 
MARKETING SENSORIAL -GABRIELA ARDON .pptx
MARKETING SENSORIAL -GABRIELA ARDON .pptxMARKETING SENSORIAL -GABRIELA ARDON .pptx
MARKETING SENSORIAL -GABRIELA ARDON .pptx
 
Presentación de la empresa polar, estados financieros
Presentación de la empresa polar, estados financierosPresentación de la empresa polar, estados financieros
Presentación de la empresa polar, estados financieros
 
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESA
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESACOPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESA
COPASST Y COMITE DE CONVIVENCIA.pptx DE LA EMPRESA
 
clase de Mercados financieros - lectura importante
clase de Mercados financieros - lectura importanteclase de Mercados financieros - lectura importante
clase de Mercados financieros - lectura importante
 
Régimen Depósito Aduanero_20200203 V1.pptx
Régimen Depósito Aduanero_20200203 V1.pptxRégimen Depósito Aduanero_20200203 V1.pptx
Régimen Depósito Aduanero_20200203 V1.pptx
 
Efectos del cambio climatico en huanuco.pptx
Efectos del cambio climatico en huanuco.pptxEfectos del cambio climatico en huanuco.pptx
Efectos del cambio climatico en huanuco.pptx
 
Contabilidad universitaria Septima edición de MCGrawsHill
Contabilidad universitaria Septima edición de MCGrawsHillContabilidad universitaria Septima edición de MCGrawsHill
Contabilidad universitaria Septima edición de MCGrawsHill
 
IDENTIDAD Y MANUAL DE MARCA PARA BRANDING
IDENTIDAD Y MANUAL DE MARCA PARA BRANDINGIDENTIDAD Y MANUAL DE MARCA PARA BRANDING
IDENTIDAD Y MANUAL DE MARCA PARA BRANDING
 
Plan General de Contabilidad Y PYMES pdf
Plan General de Contabilidad Y PYMES pdfPlan General de Contabilidad Y PYMES pdf
Plan General de Contabilidad Y PYMES pdf
 
instrumentos de mercados financieros para estudiantes
instrumentos de mercados financieros  para estudiantesinstrumentos de mercados financieros  para estudiantes
instrumentos de mercados financieros para estudiantes
 
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docx
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docxPLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docx
PLAN LECTOR JOSÉ MARÍA ARGUEDAS (1).docx
 

Unisys presentacion compania

  • 1. PRESENTACIÓN DE LA COMPAÑÍA UNISYS
  • 2. UNISYS CORPORATION r En más de 120 países Más de 23,000 empleados Casa matriz: Blue Bell, PA (U.S.A.) Datos de la Capacidad de Trabajo • Mas de 30 años de experiencia en el desarrollo de soluciones. • Mas de 1400, aplicaciones pre-construidas y modelos de procesos. • 200 millones de correos de voz alrededor del mundo. • 600 aeropuertos • 22 de los 25 bancos más grandes • 1.500 agencias de gobiernos Datos de la Capacidad de Trabajo • Mas de 30 años de experiencia en el desarrollo de soluciones. • Mas de 1400, aplicaciones pre-construidas y modelos de procesos. • 200 millones de correos de voz alrededor del mundo. • 600 aeropuertos • 22 de los 25 bancos más grandes • 1.500 agencias de gobiernos
  • 3. Page 3 Remington e Hijos inctroduce la primera maquina de escribir al mercado Unisys Corporation …Más de un siglo de historia 1873 Se funda la American Arithmometer Co. para producir y vender la primera sumadora comercial inventada por William Burroughs 1886 La American Arithmometer cambia su nombre a Burroughs Adding Machine Co. 1905 Se funda la Sperry Gyroscope Company para producir y vender equipo de navegación 1910 ENIAC, el primer computador a gran escala fue desarrollado en la Universidad de Pennsylvania por los científicos J. Presper Eckert and John Mauchly 1946 Remington Rand produce el primer computador orientado a negocios, llamado UNIVAC, fue el primer computador usado por la Of. de Impuestos de EEUU y el primer computador instalado en Japón 1949 Remington Rand adquiere la Eckert-Mauchly Computer Corp. 1950 Sperry y Remington Rand se fucionan y se convierten en Sperry Rand 1955 Sperry y Burroughs se fucionan para formar Unisys Corporation. La fución más grande de la industria de la tecnología hasta ese momento. El nombre Unisys fue elegido entre 31,000 propuestas de un concurso promovido entre los empleados de ambas compañías 1986
  • 4. Unisys en Colombia En 1952… En Julio de 1952 llegan los directivos de Burroughs para comenzar a trabajar en el país con su propia marca. La firma que representaba a Burroughs en el país en 1948 era J. Glottman. La firma cambia su nombre adecuándose a la fusión que acaba de ocurrir en EEUU, pasando a llamarse UNISYS. Desde 1948… En 1986… Unisys Corporation toma la desición de fundar una segunda compañía en Colombia especializada en servicios de Help Desk y Soporte en Sitio. En 2009…
  • 5. Unisys en la Región LACSA. • Conformada por Colombia, Perú, Venezuela, Argentina, Chile, Uruguay, Costa Rica y Puerto Rico. • + 800 empleados directos. • + 1700 contratistas. • Carlos Ferrer – Presidente.
  • 8. Page 8© 2009 Unisys Corporation. All rights reserved. Cuatro Fortaleza y Foco Modernización de Aplicaciones y Outsourcing Transformación de Data Center y Outsourcing Soporte a Usuario Final y Outsourcing Seguridad
  • 9. Page 9© 2009 Unisys Corporation. All rights reserved. Portafolio de Seguridad Evaluamos, diseñamos, integramos y gestionamos soluciones de misión critica que aseguran personas, activos, lugares, sistemas y datos para gobiernos o negocios que no pueden permitirse errores. Security Advisory Services • Risk Advisory Services • Governance & Risk Program Management • Business Continuity/Disaster Recovery Planning • Application Security Assessment IT Security Design and Implementation • Infrastructure Architecture & Engineering • Unisys Enterprise Virtualization • Secure Cloud • Disaster Recovery Architecture Service • Managed Messaging and Collaboration (ERM) • Fraud and Anti-Money Laundering • Secure Document Delivery • Secure Information Sharing (Stealth) • Application Security Integration Identity Solutions • Identity Management • Access Management • Identification & Credentialing Secure Commerce and In-Transit VisibilityAI I n-Transit Visibility / Total Asset Visibility / RFID • Port Security Roadmaps Managed Security Services • Remote Managed Security • Converged Remote Infrastructure Management Suite • Endpoint Security • Vulnerability and Risk Management • Orchestrated Disaster Recovery and Business Continuance Location, Perimeter and Surveillance Security • Intelligent Video Surveillance • Facility Management and Access Control • Command and Perimeter Security Systems • Border Security SystemsLaw Enforcement and Public Safety • Integrated Justice & Interoperability • Intelligent Video Surveillance • Inmate Telephony System
  • 10. Page 10 Vision de UNISYS en Transformacion de Data Centers: Un viaje a un servicio de TI eficiente y majeado por el negocio. Reduced cost Faster speed to market Optimized operations Improved service levels Business drivers Current state Decentralized Complex Resource-intensive Costly Transformed state Consolidated Automated Efficient Cost-effective Data Center Transformation Data center planning & management Virtualization & consolidation Service management & operations Data management & storage Secure cloud & IT outsourcing Advisory services IT initiatives Infrastructure applications
  • 11. Page 11© 2009 Unisys Corporation. All rights reserved. Portafolio de Transformación de Data Center y Outsourcing Ayudamos a nuestros clientes a potenciar sus negocios apalancando nuestros servicios de transformacionales y nuestras capacidades de outsourcing en sus data centers. Cloud and IT Automation Solutions • Unisys Secure Cloud Solution • Cloud Transformation Services • IT Service Management Consulting Services • Unisys Infrastructure Management Suite Software and Solutions • Unisys Stealth Solution for Network • SafeGuard • Storage Virtualization Products Enterprise Computing Solutions • Server Management • Storage Management • Application Hosting Services • Converged Remote Infrastructure Management Suite • Network Infrastructure Management • Remote Managed Security • Email Management • Smart On-Site Services • Enterprise Multi-vendor Support • Private Label Services • Unisys Product Support Advisory and Planning Services • DCT Advisory Services • DCT Planning and Management Services Virtualization and Consolidation • Virtualization & Consolidation Services • Unisys Consolidated Desktop Solution • Unisys Consolidated Solution for Microsoft Exchange Server • Unisys SQL Server Database Consolidation Solution • Self-funding Server Virtualization • Storage Virtualization Solutions • Enterprise Virtualization Suite • Unisys Infrastructure Management Suite Solutions • Storage Virtualization Products Data Management and Storage • Data Management and Storage Services • Storage Virtualization Solution • SafeGuard Solutions • Disk & Tape Storage • Storage Networking ClearPath and Enterprise Servers • ClearPath Mainframe Servers • ClearPath Professional Services • SOA for ClearPath • Enterprise Servers
  • 12. Desktop Services Convecionales: Core Framework Managed End-User Experience © 2009 Unisy Services Benefits Service Desk • Self-service portal • Service Request Catalog • Optimized Resolution Model • Remote diagnostics and assistance • Single point of contact via multiple communication channels • Consistent, seamless delivery worldwide 24x7 • Timely and successful resolution via integrated support levels Desk-side Support • IMACDs • Hardware Asset Tracking • On-Site Support • Asset life-cycle visibility and management • Hardware maintenance across multi vendor platforms • Last mile support when all else fails to resolve Desktop Management Services • Image Management • Patch Management • Asset Configuration Tracking • Electronic Software Distribution • Cost containment • Increased end user productivity • Higher IT Efficiency / performance • Liberated resources from low-value administrative tasks Desktop Application Services • Application Packaging • Application Catalog and License Tracking • Virtual Application Preparation • Application Experience Monitoring • Robust service levels • Better license tracking for cost containment • Increased end user productivity • Proactive and preventative
  • 13. Modelos de Entrega y Servicios Innovadores Services Benefits VOaaS (Virtual Office as a Service) • Cloud-delivered desktops via subscription • More secure, reduced risk, continuity • Disaster recovery option for desktops • Capital avoidance • Greater accessibility UCaaS (Unified Communications as a Service) • Cloud delivery of multi-tenant collaboration, e- mail and communication applications via subscription • Simplified delivery • Cost effective • Scalability • Reduced operational burden Application Virtualization Services • Preparation, sequencing and deployment of desktop applications for use in a virtual environment • Improved application management • Avoid in-house support • Simplifies application deployment and maintenance Virtual Desktop Services • Monitoring and management of virtual desktops including virtual machine preparation, install, change and update including the creation and support of pools of virtual desktops and the association of groups of users • Avoid in-house support • Simple extension of conventional services to virtual deploy • Simplified management • Reduced cost
  • 14. Gestion de Digital Allowance: Flexibilidad y Escogencia del Usuario Page 14 Services Benefits Remediation Service • Enhanced remote personal computer monitoring and repair tools • Online and Remote Device Support • Enhanced user and self support options • Better end user experience Managed Digital Allowance • Online portal with tools for end-user selection and support of devices for use in the workplace • Portal with Bookstore • Flexibility and choice • Greater user satisfaction • Improved user productivity Client-side Virtualization Services • Monitoring and management of end-user device- resident virtual desktops • Portable Virtual Client Service • Greater device flexibility • Better end user experience • Secure deployment
  • 15. Page 15© 2009 Unisys Corporation. All rights reserved. Portafolio de Soporte a Usuarios Finales y Outsourcing Unisys End User Services provee en cualquier lugar y a cualquier hora soporte a los usuarios finales de nuestros clientes con un modelo global de una-llamada que incrementa la satisfacción del usuario mientras bajan los costos. Business Service Management • Converged Remote Infrastructure Management • Service Desk Platform as a Service • Email Management • Managed Messaging and Collaboration • Communications and Collaboration • Consolidated Solutions for MS Exchange Managed Security Services • Endpoint Security • Vulnerability and Risk Management • Identity and Access Management • Remote Managed Security End User Support Solutions • End User Productivity Services • Self-Service Portal Solutions • Desktop Lifecycle Management • Desktop Deployment and Image Management • Consolidated Desktop Solutions Infrastructure Support Solutions • Smart-On-Site Services • Multi-Vendor Support • Enterprise Multi-Vendor Support • Private Label Services • Hardware and Software Asset Management
  • 16. 16 Proveemos servicios para el ciclo de vida de las aplicaciones Planning Architecture Application Infrastructure Resources Secure Business Operations Application Portfolio Assessment Governance Security Assessment Enterprise Architecture Application Modernization TestingApp Development & Systems Integration Application Management Application Hosting Global Solution Centers Application Management Centers Low-Cost Labors Coordination These capabilities will be specialized to support specific Industry Solutions SOA Enablement
  • 17. Page 17© 2009 Unisys Corporation. All rights reserved. Portafolio de Modernización de Aplicaciones y Outsourcing Mejoramos la productividad de nuestros clientes y su posición competitiva modernizando y tercerizando las aplicaciones de misión critica. Nuestra capacidades extiende la vida de los activos actuales de nuestros clientes. Application Advisory • IT Strategy and Transformation • Enterprise Architecture & Technology • Application Modernization Advisory • Application Outsourcing Advisory • Application Security Assessments Application Security • Security Assessments • Security Integration Application Modernization • Discovery and Planning • Transformation Services • Customer Programs Management Application Outsourcing • Development • Operations • Customer Program Management • Hosting • Support and Maintenance Industry Applications • Financial • Government • Communications • Transportation
  • 18. Page 18© 2009 Unisys Corporation. All rights reserved. Alianzas Estratégicas de UNISYS Alianzas fuertes con otras organizaciones lideres de industria no permiten movernos rápida y confiadamente a través de un amplio rango de tecnologías y servicios que nos ayudan a entregar lo la mejor solución a los retos de negocio críticos de nuestros clientes.

Notas del editor

  1. This is not an everyday economic downturn Excess is out … frugality and cost-efficiency are in Pendulum has swung from an era of “more” to era of “less” Can no longer throw more servers, more consultants, more computing power at the problem Organizations must learn to operate permanently with: Less budget Less staff Less time to get things done
  2. Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check. Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money. Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications. Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process. IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.] Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’. As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new technologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
  3. Opening Dialog (Animated slide): the Unisys vision for Data Center Transformation is based on a Journey toward business driven, efficient IT service delivery Key Points: The DCT Vision starts by defining the key business drivers that are essential for organizations to focus on …   ’ Notes to Speaker: each of the following IT Initiative areas will be discussed in additional detail in the next section. If you plan to go into each slide in the next section, you can summarize them here. Otherwise, you may wish to provide more detail of each IT Initiative on this slide [MOUSE-CLICK] The second part of the DCT Vision defines a collection of IT Initiatives which are instrumental in supporting these business drivers Utilizes workshops and in-depth analysis to provide our clients strategic guidance on data center transformation initiatives. This can take the form of a strategic IT planning session, where a former CxO will provide feedback on your intiiatives, or a value assessment study which focuses on the financial business case for initiatives you are considering Data Center Planning and Management: is where we define, design and manage the transition or modernization of critical data center assets Consolidation and Virtualization: provides proven assessment, design and implementation methods for consolidation & virtualization initiatives Service Management & Operations: is focused on improving ITSM processes to reduce costs, mitigate risks, improve the quality of IT services: preparing for and implementing infrastructure & process automation initiatives Storage & Lifecycle Data Management: provides our clients with essential solutions and services for their storage infrastructure, disaster recovery and data protection initiatives Infrastructure Applications: provides our clients the application infrastructure to support collaboration, communication, and database driven business solutions Cloud Computing / IT Outsourcing: Delivers “best-fit” sourcing strategies, “no excuses, no surprises” performance and “on time, everywhere” global delivery to optimize operations, control costs, reduce risk and align business with IT goals [MOUSE-CLICK] the Data Center Transformation Journey will evolve an IT infrastructures from a current state which is often decentralized, complex, resource-intensive and costly, to a future-state which is right-sized (or consolidated), automated, and more efficient and cost-effective. This DCT journey is similar to the evolution defined by familiar maturity model frameworks, such as Gartner’s Infrastructure and Operations Maturity Model (I&OMM) <next slide> +++Backup Data:+++
  4. Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check. Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money. Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications. Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process. IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.] Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’. As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new technologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
  5. EUPS – Core Framework for Managed End-User Experience – Proactive Operations & Engineering Service Desk - end-user desktop hardware & software support via phone, email, and Unisys Service Portal. Single point of access and control, proactive 24x7 monitoring and escalation, service request and incident logging, and incident resolution ITIL Processes Involved: Desk-side Support - Global multi-vendor hardware maintenance and desk-side support including: Onsite repair & placement maintenance for end-user hardware Onsite software diagnosis & incident resolution for desktops, laptops, & other PC peripherals SLA measurements, performance data & reporting Onsite dispatch for installs, moves, adds, changes, & uninstalls ITIL Processes Involved: Desktop Management Services – Image Management – definition, support and revision of the customer’s image files & standards Patch Management – distribution & tracking of OS & application patches to managed systems Asset Life Cycle Tracking – definition, implementation & management client devices throughout their lifecycle Electronic Software Distribution – managed delivery of software onto devices within the supported environment via electronic means ITIL Processes Involved: (same as Desk-side Support) Desktop Application Services— Application Packaging Application Catalog Support Software License Tracking Virtual Application Preparation ITIL Processes Involved: (same as Desk-side Support) Service Request Incident Management Problem Management Knowledge Management Service Request Incident Management Problem Management Knowledge Management Asset Tracking Change management
  6. EUPS – Innovative Delivery Models VOaaS – “Virtual Office as a Service” Cloud-delivered desktops via subscription Virtual Machine IMACDs Customer Service Interface UCaaS – “Unified Communications as a Service” Cloud delivery of multi-tenet collaboration, e-mail and communication applications via subscription MS Exchange MS SharePoint MS Office Communicator Application Virtualization Services – Preparation, sequencing and deployment of desktop applications for use in a virtual environment Application Package Shape and Sequence Service Virtual Desktop Services - Monitoring and management of virtual desktops including virtual machine preparation, install, change and update including the creation and support of pools of virtual desktops and the association of groups of users Virtual Machine IMACDs Session/Broker Management Pool Creation and Maintenance Management Center Operation ITIL Processes Involved: VOaaS HCCS Application Virtualization Serivces Service Request Incident Management Problem Management Knowledge Management Change Management Virtual Desktop Services All of the above, plus... Configuration Management
  7. EUPS – Dynamic End Point Provisioning & Support User Flexibility and Choice Remediation Service Service Request Incident Management Problem Management Knowledge Management Managed Digital Allowance All of the above, plus... Change Management Client Side Virtualization Services All of the above, plus... Asset Tracking
  8. Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check. Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money. Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications. Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process. IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.] Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’. As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new echnologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
  9. Application Services provides solutions that cover the entire Software Development Lifecycle and provides the multiple sourcing options for resources to provide these services.   Our services include: For Planning, we provide services to assess your existing application assets and your application security posture.  In addition, we have IT Governance processes and resources that can help you manage through complex situations that your IT organizations may be facing. For Architecture, we have solutions and SME’s in Enterprise Architecture and SOA Enablement.  We leverage our real-world experience in developing mission-critical, production-quality software application to provide this experience to help you solve your architecture problems or help you design and plan your next generation architecture. For Application, we have a full set of development, implementation and Maintenance services to help you create and manage complex applications. Application Modernization is comprised of services to help you get the most of your existing legacy investment from knowledge mining  business rules to automation-assisted code replatforming We have decades of experience in Application Development and Systems Integration that can we applied to implement software in a wide range of environments. Testing is an implementation service that can be delivered as an separate solution for those environments where independence or an efficient resource pool is required. Application Management includes our range or Application Outsourcing to manage and maintain existing applications in a cost-effective way.  This allows our customers to use their resources in other ways than do the day-to-day maintenance of their application assets. In Infrastructure, we provide Application Hosting services for our clients that don’t want to run, maintain and own the infrastructure that is executing systems that we are involved in providing services for. For resources, Unisys has a global sourcing pool that we can draw upon to pull the best and most appropriate resources to provide our services. Wrapping all of this, are our Application Security services that ensure that the operations conducted by the applications we are involved in are secure to provide the best business operations.
  10. Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check. Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money. Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications. Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process. IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.] Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’. As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new echnologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.